Play Store Reveals Three Malicious Applications for Mining Monero Coins
Trend Micro the cyber-security company discovered two malware strains -CpuMiner and JsMiner hanging at the back of three applications even as the malevolent payload ate up the processing power of the infected phone like a parasite with the purpose of mining Monero coins. The applications apparently were tame-free applications, two of which were -one religious prayer application and one wireless scanner.
When any crypto-currency miner does its activity it consumes the host device's CPU power as the end-user browses a website which has the mining tool like the ShowTime and Pirate Bay sites. Suppose the end-user has his smart-phone on then it would be attacked with malware-infested applications containing a mining code for crypto-currency that utilizes the smart-phone's power for producing digital coins. Hackread.com posted this, October 31, 2017.
The application pulled down from Play Store needs to be opened to let it configure onto the smart-phone over some seconds after which Notification History Log would activate on the device having Android 4.4 KitKat alternatively a higher version that the latest phone models have.
Presently, it'd be appropriate to do a checking of every application's permission on the end-user's phone via navigating to Settings then Apps then selecting any application, pressing on 'Menu' followed with highlighting 'All Permissions.'
For end-users specifically worried about Activity Recognition, it would be worthwhile uninstalling the application which seeks the permission.
» SPAMfighter News - 06-11-2017
We are happy to see you are reading our IT Security News.
We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!